You left the GSE off your list of requirements, which is the cornerstone of the program. Also, in order to take that, you'll need GSEC (unless you sub both GCUX and GCWN).
I've challenged every SANS certification I have, with the exception of one that I got for free for participating in a study. The nice thing about SANS/GIAC is that they're vendor neutral/open-source whenever possible, so a lot of the information is usually already floating around somewhere. I go through the two practices you get with a challenge, and I make note of every tool, technique, etc. that is mentioned anywhere. I combine this list with the day-by-day breakdown of the corresponding course, and then create an outline in Word for each topic. Then I research.
I include help output, man pages, examples, workflows, etc. I usually end up with about 400+ pages for each exam. I also include anything related I come across while doing research and think might be applicable. For example, if I think a NIST document is relevant, I read through that and include it in the printout I bring in with me. The thing about doing all this work is that you learn the materially REALLY well. I often only end up referring to it a few times throughout the exam, and my lowest score so far is 85%.
I wouldn't try to match up other courses because they're just not going to fit well. For example, the OffSec courses (as much as I love [hate] them), just don't map to GPEN and GXPN. I haven't done the Hacker Academy Forensics module. While it will probably help some, I doubt it will prepare you for the exam.
Here are a few recommendations off the top of my head:
GSEC - Network Security Bible
GPEN - I didn't prepare for this one since I do pen testing full time; I think I even gifted my practice exams. I'd probably go with the usual suspects of Hacking Exposed, Gray Hat Hacking, Penetration Tester's Open Source Toolkit, the Metasploit book, etc.
GCFA - File System Forensic Analysis, and 3-4 of the new Syngress Forensic books
GCIH - Real Digital Forensics (probably brought this to GCFA as well), NIST 800-61 - Look at the course page, only one day is incident handling and the rest are hacker techniques. You should be in good shape if you have GPEN under control and have a good handle on the six steps.
GCIA - Multiple Bejtlich books, The TCP/IP Guide, the official Snort manual
GWAPT - WAHH2, Hacking Exposed Web Apps (3rd, I think), tons of OWASP material
GAWN - Haven't done this one, but the resources you listed will fall ridiculously short. The Hacking Exposed Wireless book will probably be the best single resource, but you'll probably have to research a lot of items (RFID, Zigbee, Bluetooth, etc.) to be fully prepared. This is a very broad course.
GXPN - Did the course for this one
GCFW - In addition to the GCIA material (lots of overlap -- a solid grasp on TCP/IP will go far with both of these), just spend time with pfSense, iptables, etc. and take notes for anything new on the practice exams
I haven't done either GCWN or GCUX, but again, just do research. You'll probably be able to cobble together what you need from blogs, Technet, etc. You may not find dedicated books on this subject, but security may make up 25-30% of a general book on Windows or *nix.
Also, they'll ship your cert for free, but it's the wood plaque that you have to pay for (which used to be free as well). Maybe it's different/more expensive because you're in Canada.
The nice thing about the GSE is that one written exam every four years will renew all your GIAC certs. I'm not ambitious; I'm lazy and cheap
The day you stop learning is the day you start becoming obsolete.